CVE-2013-1997

Source
https://nvd.nist.gov/vuln/detail/CVE-2013-1997
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2013-1997.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2013-1997
Related
Published
2013-06-15T20:55:00Z
Modified
2024-09-18T01:00:22Z
Summary
[none]
Details

Multiple buffer overflows in X.org libX11 1.5.99.901 (1.6 RC1) and earlier allow X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the (1) XAllocColorCells, (2) _XkbReadGetDeviceInfoReply, (3) _XkbReadGeomShapes, (4) _XkbReadGetGeometryReply, (5) _XkbReadKeySyms, (6) _XkbReadKeyActions, (7) _XkbReadKeyBehaviors, (8) _XkbReadModifierMap, (9) _XkbReadExplicitComponents, (10) _XkbReadVirtualModMap, (11) _XkbReadGetNamesReply, (12) _XkbReadGetMapReply, (13) _XimXGetReadData, (14) XListFonts, (15) XListExtensions, and (16) XGetFontPath functions.

References

Affected packages

Debian:11 / libx11

Package

Name
libx11
Purl
pkg:deb/debian/libx11?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:1.5.0-1+deb7u1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / libx11

Package

Name
libx11
Purl
pkg:deb/debian/libx11?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:1.5.0-1+deb7u1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / libx11

Package

Name
libx11
Purl
pkg:deb/debian/libx11?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:1.5.0-1+deb7u1

Ecosystem specific

{
    "urgency": "not yet assigned"
}